Novel Implementation of O-Pass Security Model Design of User Authentication for Password Stealing and Reuse Attacks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 2
Abstract
Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilities. Firstly, users often select weak passwords and reuse the same passwords across different websites. Routinely reusing passwords causes a domino effect; when an adversary compromises one password, she will exploit it to gain access to more websites. Second, typing passwords into untrusted computers suffers password thief threat. An adversary can launch several password stealing attacks to snatch passwords, such as phishing, key loggers and malware. In this paper, we design a user authentication protocol named oPass which leverages a user’s cell phone and short message service to thwart password stealing and password reuse attacks. oPass only requires each participating website possesses a unique phone number, and involves a telecommunication service provider in registration and recovery phases. Through oPass, users only need to remember a long-term password for login on all websites. After evaluating the oPass prototype, we believe oPass is efficient and affordable compared with the conventional web authentication mechanisms. This paper provides a novel design and implementation of this OPass Security Model.
Authors and Affiliations
Dr. M. Ramabai , J. V. Prashanthi , P. Monika Raju , A. V. L Prasuna , M. Upendra Kumar
Proactive Web Server Protocol for Complaint Assessment
Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to un-awareness of software vulnerabilitie...
Locate Misplaced Objects! GPS-GSM-Bluetooth Enabled Tracking
Every house has had a history of searching for keys, pen-drives, wallets and hand-purses and it is such a tedious job, especially, when they are of utmost need. To reduce the hectic searching effort and time spent, a sys...
A Support Vector Machine and Information Gain based Classification Framework for Diabetic Retinopathy Images
Image mining is the process of applying data analysis and discovery algorithms over large volume of image data. It has especially become popular in the fields of forensic sciences, fraud analysis and health care, for it...
Distributed Observer Design for Leader following Control of Multi-Agent System with Pinning Technique
This paper is concerned with a leader–follower problem for a multi-agent system designed by the pinning control technique without assuming that the interaction graph is connected. Distributed observers are designed for t...
Enhancing Adaptive Content Based Face Image Retrieval in Database
To address one of the important and challenging problems – large-scale content-based face image retrieval. Given a query face image, content-based face image retrieval tries to find similar face images from a large image...